cryptax / techweb
My own technical notes
☆18Updated last month
Related projects ⓘ
Alternatives and complementary repositories for techweb
- Automated Information Retrieval From APKs For Initial Analysis☆32Updated 7 years ago
- Test Android Application.☆19Updated 8 years ago
- ☆18Updated 5 years ago
- iOS malware samples☆36Updated 8 years ago
- ☆17Updated 9 months ago
- Fighting String Encryption in Android Malware☆57Updated 2 years ago
- My IDA scripts, tips and testing techniques for Thick Client applications.☆17Updated 10 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Updated 9 years ago
- Work in Progress repo☆14Updated 5 years ago
- Scripts for OSCE☆18Updated 5 years ago
- Insecure Vulnerable Android Application that helps to learn hacing and securing apps☆21Updated 9 years ago
- Modified version of ActiveScan++ Burp Suite extension☆31Updated 7 years ago
- ☆15Updated last year
- A tool pulls loaded binaries ordered by memory regions☆34Updated 5 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆50Updated 7 years ago
- Miscellaneous analysis tools☆26Updated 9 years ago
- A simple grep user interface for searching code which can be used for SAST.☆8Updated 5 years ago
- MobSF related Presentations, Slides and Others.☆31Updated 6 years ago
- inviteflood : SIP/SDP INVITE message flooding over UDP/IP☆11Updated 9 years ago
- A playground to practice SSRF Attacks against web apps☆17Updated 6 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Updated 6 years ago
- Framework for static and dynamic analysis in Android APKs☆32Updated 7 years ago
- Pentest utils☆14Updated 8 years ago
- ☆20Updated 5 years ago
- SWF Vulnerability & Information Scanner☆19Updated 5 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Updated 5 years ago
- Break Apps with Frida workshop material☆43Updated 7 years ago
- Group Policy Hijacking☆31Updated 6 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago